

Ping Identity Platform and CyberArk Certificate Manager are competing products in identity management and security. Ping Identity Platform seems to have an advantage in integration flexibility and ease of use, while CyberArk Certificate Manager stands out for its robust security features.
Features: Ping Identity Platform provides comprehensive identity management with seamless application integration, adaptive authentication, and extensive API access management. CyberArk Certificate Manager focuses on securing digital certificates with advanced automation and deep security infrastructure integration.
Room for Improvement: Ping Identity Platform could enhance its specialized security features, refine automation capabilities, and further streamline its integration process. CyberArk Certificate Manager could improve its deployment complexity, expand integration flexibility, and simplify user interface navigation.
Ease of Deployment and Customer Service: Ping Identity Platform is recognized for straightforward deployment supported by responsive customer service. CyberArk Certificate Manager, while more complex to deploy due to security measures, offers detailed support for intricate environments.
Pricing and ROI: Ping Identity Platform involves a higher initial setup cost but offers significant ROI through efficient integration and operational enhancements. CyberArk Certificate Manager, with a less predictable cost structure, provides value for security-focused organizations through automation and management capabilities.
Earlier, we had an operations team of seven people to manage certificates manually, but now it has reduced costs by reducing the team to two people with the help of the certificate management tool.
CyberArk Certificate Manager is doing its best with multiple layers of security.
I have seen a return on investment in terms of money saved and time saved.
Inquiries are typically addressed the same day, with most issues, even complex ones, resolved within 24 hours.
Venafi's technical support is excellent, with even their first-tier support being in-house and highly competent.
Their technical support is knowledgeable and helpful, making Venafi stand out among other CyberArk products.
I have reached out to technical support for troubleshooting SAML certificate mismatches and federated errors between Ping and enterprise apps.
This role-based access control enhances scalability and efficiency by providing a focused view of necessary information.
Horizontal scaling is a necessity rather than vertical scaling.
Scalability with Venafi is good; you can definitely use it if you have ten thousand certs, a thousand certs, a million, or a couple million.
Venafi's stability has been consistently reliable.
Venafi is a stable product. It's definitely more stable than others.
I observed that in the last year, CyberArk Certificate Manager was down two to three times without any notification.
Expanding the range of out-of-the-box integrations would significantly improve the user experience.
The yearly DNS verification required by certificate authorities necessitates manual intervention, hindering full automation.
They are pushing for cloud adoption, but we prefer on-premises solutions due to regulatory concerns.
I would like to enable ServiceNow Generative AI for auto-diagnosing PingFederate SSO failures and suggest remediation steps.
Ping Identity Platform has multiple products for access management, identity management, a solution for API security, a solution for authorization, and a product for identity verification.
Venafi offers good value for the cost.
The pricing has increased for us, impacting our organization due to its operational expenditure (OPEX).
For our budget, Venafi's cost is moderate. It's not expensive as internal certificate generation is free, and we only pay for the public CA certificate signer and for storage in Venafi.
The most valuable feature of Venafi is the automation that helps save time and reduce human error.
It ensures centralized certificate management, which is crucial for compliance and maintaining best practices.
What I like best about Venafi is that it's very easy to get somebody on a call and get any of my questions answered.
The platform enhances security measures by analyzing multi-factor authentication attempts, highlighting suspicious patterns, and generating compliance reports.
It's a converged platform which can do both identity management, access management, and recently they are bringing privilege management capability as well.
| Product | Mindshare (%) |
|---|---|
| Ping Identity Platform | 3.7% |
| CyberArk Certificate Manager | 1.9% |
| Other | 94.4% |

| Company Size | Count |
|---|---|
| Small Business | 8 |
| Large Enterprise | 17 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 2 |
| Large Enterprise | 20 |
CyberArk Certificate Manager automates and streamlines certificate processes, reducing errors and enhancing efficiency. It centralizes management, supports compliance, and improves certificate lifecycle management with customizable features.
CyberArk Certificate Manager offers a streamlined approach to managing certificates, focusing on automation that minimizes manual intervention and errors. Its discovery and centralized management enhance operational efficiency, while integration capabilities facilitate seamless handling of certificates across systems like AWS and Azure. Users benefit from its user-friendly, intuitive interface, robust reporting, and customizable notifications, which improve compliance, reduce bottlenecks, and allow for custom field creation. Though the on-premises version is mature, there is room for improvement in cloud service integration and out-of-the-box features. Additional enhancements are needed in documentation clarity, hardware security module support, and diverse scripting language support.
What are the most important features of CyberArk Certificate Manager?CyberArk Certificate Manager finds applications across multiple industries like finance and healthcare where stringent security protocols are critical. Organizations use it for server authentication and managing application IDs, ensuring compliance and preventing outages. Its integration with major cloud platforms and automation of installations across endpoints makes it an ideal choice for companies focusing on enhancing security and operational efficiency.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.